Wipe Snoopers Out Of Your Networks
A flexible DNS proxy, with support for modern encrypted DNS protocols such as DNSCrypt v2, DNS-over-HTTPS, Anonymized DNSCrypt and ODoH (Oblivious DoH).
- For all features please refer to the OFFICIAL PAGE
- All binary files are downloaded from the OFFICIAL RELEASE PAGE
There Are Automated DNSCrypt-Proxy Client For Both Windows & Android (Magisk Module)
But For Linux, People Find It Hard To Configure DNSCrypt-Proxy Manually. But I Wanted To Keep It Simple, So It's Here !
Arch / Arch Based Distro With SystemD & NetworkManager
-
server_names
=ams-dnscrypt-nl
[NLD],d0wn-tz-ns1
[TZA],dct-nl
[NLD],dct-ru
[RUS],dnscrypt.be
[BEL],dnscrypt.pl
[POL],dnscrypt.uk-ipv4
[GBR],dnswarden-uncensor-dc-swiss
[CHE],meganerd
[NLD],openinternet
[USA],plan9dns-fl
[USA],plan9dns-mx
[MEX],plan9dns-nj
[USA],pryv8boi
[DEU],sby-limotelu
[IDN],scaleway-ams
[NLD],scaleway-fr
[FRA],serbica
[NLD],techsaviours.org-dnscrypt
[DEU],v.dnscrypt.uk-ipv4
[GBR] are the resolvers in use. -
doh_servers = false
(disable servers implementing theDNS-over-HTTPS
protocol) -
require_dnssec = true
(server must supportDNSSEC
security extension) -
force_tcp = true
(fix for mobile data intial connection random issues ifroutes
have been set andskip_incompatible = true
, see DNSCrypt/dnscrypt-proxy/discussions/2020) -
timeout = 1000
(set the max. response time of a single DNS query from5000
to1000
ms.) -
blocked_query_response = 'refused'
(setrefused
response to blocked queries) -
# log_level = 0
(set the log level of thednscrypt-proxy.log
file to very verbose, but keep it disabled by default) -
dnscrypt_ephemeral_keys = true
(create a new, unique key for every single DNS query) -
bootstrap_resolvers = ['45.11.45.11:53']
(use DNS.SB instead CloudFlare) -
netprobe_address = '45.11.45.11:53'
(use DNS.SB instead CloudFlare) -
block_ipv6 = true
(immediately respond to IPv6-related queries with an empty response) -
blocked-names.txt
,blocked-ips.txt
,allowed-names.txt
andallowed-ips.txt
files enabled. (to know more specifics about this, please refer to the Filters (optional) section below) -
anonymized_dns
feature enabled. (routes
are indirect ways to reach DNSCrypt servers, each resolver has 2 relays assigned) -
skip_incompatible = true
(skip resolvers incompatible with anonymization instead of using them directly) -
direct_cert_fallback = false
(prevent direct connections through the resolvers for failed certificate retrieved via relay)
git clone https://github.com/D357R0Y3R/Hardened-Anonymized-DNSCrypt-Proxy
cd Hardened-Anonymized-DNSCrypt-Proxy
makepkg -Ccrfs --noconfirm
sudo pacman -U *zst
sudo pacman -Rcnsu Hardened-Anonymized-DNSCrypt-Proxy
Filters are a powerful set of built-in features, that let you control exactly what domain names and IP addresses your device are allowed to connect to. This can be used to block ads, trackers, malware, or anything you don't want your device to load. To know more about it, you can check the official documentation DNSCrypt-Proxy-Filters
- You can edit
dnscrypt-proxy.toml
as you wish located on/etc/dnscrypt-proxy/dnscrypt-proxy.toml
- For more detailed configuration please refer to official documentation
- Frank Denis & All Other Contributors For This Awesome Project
- Special Thanks To d3cim For The DNSCrypt-Proxy Configuration